From: Dan Williams <dan.j.williams@intel.com>
To: mingo@redhat.com
Cc: Andy Shevchenko <andy@infradead.org>,
Borislav Petkov <bp@alien8.de>,
Vishal Verma <vishal.l.verma@intel.com>,
Keith Busch <kbusch@kernel.org>, Len Brown <lenb@kernel.org>,
Will Deacon <will@kernel.org>,
Catalin Marinas <catalin.marinas@arm.com>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
Darren Hart <dvhart@infradead.org>,
Dave Jiang <dave.jiang@intel.com>,
"Rafael J. Wysocki" <rafael.j.wysocki@intel.com>,
Jonathan Cameron <Jonathan.Cameron@huawei.com>,
"H. Peter Anvin" <hpa@zytor.com>,
Thomas Gleixner <tglx@linutronix.de>,
kbuild test robot <lkp@intel.com>,
Peter Zijlstra <peterz@infradead.org>,
Dave Hansen <dave.hansen@linux.intel.com>,
x86@kernel.org, "Rafael J. Wysocki" <rjw@rjwysocki.net>,
Andy Lutomirski <luto@kernel.org>,
x86@kernel.org, linux-efi@vger.kernel.org,
linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org
Subject: [PATCH v6 00/12] EFI Specific Purpose Memory Support
Date: Wed, 09 Oct 2019 16:04:33 -0700 [thread overview]
Message-ID: <157066227329.1059972.5659620631541203458.stgit@dwillia2-desk3.amr.corp.intel.com> (raw)
Changes since v5 [1]:
- Move efi=nosoftreserve infrastructure to a common location. (Ard)
- Define a common efi_soft_reserve_enabled() helper for efi
stub code and runtime core efi. (Ard)
- Add ARM support for honoring soft reservations (Ard)
- Rename x86-fake_mem.c to x86_fake_mem.c. (Ard)
- Rebase on v5.4-rc2
[1]: http://lkml.kernel.org/r/156712993795.1616117.3781864460118989466.stgit@dwillia2-desk3.amr.corp.intel.com
---
Merge notes:
Hi Ingo,
I'm targeting you since you piped on v5, and tip.git in general since
the deepest changes are in x86 init code. The entanglements between
tip.git and acpi.git that v5 hit have been resolved with what went
upstream during the 5.4 merge window. This all still needs an ack from
Ard to make sure he's on board with all the current changes, or
otherwise spots some more fixups. The ARM changes have only been compile
tested (0day-robot). The x86 changes, as mentioned below, have been boot
tested with efi_fake_mem= on a QEMU config that produces an HMAT.
---
The EFI 2.8 Specification [2] introduces the EFI_MEMORY_SP ("specific
purpose") memory attribute. This attribute bit replaces the deprecated
ACPI HMAT "reservation hint" that was introduced in ACPI 6.2 and removed
in ACPI 6.3.
Given the increasing diversity of memory types that might be advertised
to the operating system, there is a need for platform firmware to hint
which memory ranges are free for the OS to use as general purpose memory
and which ranges are intended for application specific usage. For
example, an application with prior knowledge of the platform may expect
to be able to exclusively allocate a precious / limited pool of high
bandwidth memory. Alternatively, for the general purpose case, the
operating system may want to make the memory available on a best effort
basis as a unique numa-node with performance properties by the new
CONFIG_HMEM_REPORTING [3] facility.
In support of optionally allowing either application-exclusive and
core-kernel-mm managed access to differentiated memory, claim
EFI_MEMORY_SP ranges for exposure as "soft reserved" and assigned to a
device-dax instance by default. Such instances can be directly owned /
mapped by a platform-topology-aware application. Alternatively, with the
new kmem facility [4], the administrator has the option to instead
designate that those memory ranges be hot-added to the core-kernel-mm as
a unique memory numa-node. In short, allow for the decision about what
software agent manages soft-reserved memory to be made at runtime.
The patches build on the new HMAT+HMEM_REPORTING facilities merged
for v5.2-rc1. The implementation is tested with qemu emulation of HMAT
[5] plus the efi_fake_mem facility for applying the EFI_MEMORY_SP
attribute. Specific details on reproducing the test configuration are in
patch 12.
[2]: https://uefi.org/sites/default/files/resources/UEFI_Spec_2_8_final.pdf
[3]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e1cf33aafb84
[4]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c221c0b0308f
[5]: http://patchwork.ozlabs.org/cover/1096737/
---
Dan Williams (12):
acpi/numa: Establish a new drivers/acpi/numa/ directory
efi: Enumerate EFI_MEMORY_SP
x86/efi: Push EFI_MEMMAP check into leaf routines
efi: Common enable/disable infrastructure for EFI soft reservation
x86/efi: EFI soft reservation to E820 enumeration
arm/efi: EFI soft reservation to memblock
x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP
lib: Uplevel the pmem "region" ida to a global allocator
dax: Fix alloc_dax_region() compile warning
device-dax: Add a driver for "hmem" devices
acpi/numa/hmat: Register HMAT at device_initcall level
acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device
Documentation/admin-guide/kernel-parameters.txt | 19 +++
arch/arm64/mm/mmu.c | 2
arch/x86/boot/compressed/eboot.c | 6 +
arch/x86/boot/compressed/kaslr.c | 46 +++++++-
arch/x86/include/asm/e820/types.h | 8 +
arch/x86/include/asm/efi.h | 17 +++
arch/x86/kernel/e820.c | 12 ++
arch/x86/kernel/setup.c | 18 +--
arch/x86/platform/efi/efi.c | 53 ++++++++-
arch/x86/platform/efi/quirks.c | 3 +
drivers/acpi/Kconfig | 9 --
drivers/acpi/Makefile | 3 -
drivers/acpi/hmat/Makefile | 2
drivers/acpi/numa/Kconfig | 7 +
drivers/acpi/numa/Makefile | 3 +
drivers/acpi/numa/hmat.c | 138 +++++++++++++++++++++--
drivers/acpi/numa/srat.c | 0
drivers/dax/Kconfig | 27 ++++-
drivers/dax/Makefile | 2
drivers/dax/bus.c | 2
drivers/dax/bus.h | 2
drivers/dax/dax-private.h | 2
drivers/dax/hmem.c | 56 +++++++++
drivers/firmware/efi/Kconfig | 21 ++++
drivers/firmware/efi/Makefile | 5 +
drivers/firmware/efi/arm-init.c | 9 ++
drivers/firmware/efi/arm-runtime.c | 24 ++++
drivers/firmware/efi/efi.c | 14 ++
drivers/firmware/efi/esrt.c | 3 +
drivers/firmware/efi/fake_mem.c | 26 ++--
drivers/firmware/efi/fake_mem.h | 10 ++
drivers/firmware/efi/libstub/arm32-stub.c | 5 +
drivers/firmware/efi/libstub/efi-stub-helper.c | 19 +++
drivers/firmware/efi/libstub/random.c | 4 +
drivers/firmware/efi/x86_fake_mem.c | 69 ++++++++++++
drivers/nvdimm/Kconfig | 1
drivers/nvdimm/core.c | 1
drivers/nvdimm/nd-core.h | 1
drivers/nvdimm/region_devs.c | 13 +-
include/linux/efi.h | 10 ++
include/linux/ioport.h | 1
include/linux/memregion.h | 23 ++++
lib/Kconfig | 3 +
lib/Makefile | 1
lib/memregion.c | 18 +++
45 files changed, 627 insertions(+), 91 deletions(-)
delete mode 100644 drivers/acpi/hmat/Makefile
rename drivers/acpi/{hmat/Kconfig => numa/Kconfig} (75%)
create mode 100644 drivers/acpi/numa/Makefile
rename drivers/acpi/{hmat/hmat.c => numa/hmat.c} (85%)
rename drivers/acpi/{numa.c => numa/srat.c} (100%)
create mode 100644 drivers/dax/hmem.c
create mode 100644 drivers/firmware/efi/fake_mem.h
create mode 100644 drivers/firmware/efi/x86_fake_mem.c
create mode 100644 include/linux/memregion.h
create mode 100644 lib/memregion.c
next reply other threads:[~2019-10-09 23:18 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-10-09 23:04 Dan Williams [this message]
2019-10-09 23:04 ` [PATCH v6 01/12] acpi/numa: Establish a new drivers/acpi/numa/ directory Dan Williams
2019-10-09 23:04 ` [PATCH v6 02/12] efi: Enumerate EFI_MEMORY_SP Dan Williams
2019-10-09 23:04 ` [PATCH v6 03/12] x86/efi: Push EFI_MEMMAP check into leaf routines Dan Williams
2019-10-09 23:04 ` [PATCH v6 04/12] efi: Common enable/disable infrastructure for EFI soft reservation Dan Williams
2019-10-10 6:36 ` Ard Biesheuvel
2019-10-09 23:05 ` [PATCH v6 05/12] x86/efi: EFI soft reservation to E820 enumeration Dan Williams
2019-10-10 6:44 ` Ard Biesheuvel
2019-10-10 18:31 ` Dan Williams
2019-10-10 18:40 ` Ard Biesheuvel
2019-10-11 2:39 ` Dan Williams
2019-10-11 5:52 ` Ard Biesheuvel
2019-10-11 14:35 ` Dan Williams
2019-10-11 14:38 ` Ard Biesheuvel
2019-10-09 23:05 ` [PATCH v6 06/12] arm/efi: EFI soft reservation to memblock Dan Williams
2019-10-10 6:46 ` Ard Biesheuvel
2019-10-09 23:05 ` [PATCH v6 07/12] x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP Dan Williams
2019-10-10 7:01 ` Ard Biesheuvel
2019-10-09 23:05 ` [PATCH v6 08/12] lib: Uplevel the pmem "region" ida to a global allocator Dan Williams
2019-10-09 23:05 ` [PATCH v6 09/12] dax: Fix alloc_dax_region() compile warning Dan Williams
2019-10-09 23:05 ` [PATCH v6 10/12] device-dax: Add a driver for "hmem" devices Dan Williams
2019-10-09 23:05 ` [PATCH v6 11/12] acpi/numa/hmat: Register HMAT at device_initcall level Dan Williams
2019-10-09 23:05 ` [PATCH v6 12/12] acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device Dan Williams
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=157066227329.1059972.5659620631541203458.stgit@dwillia2-desk3.amr.corp.intel.com \
--to=dan.j.williams@intel.com \
--cc=Jonathan.Cameron@huawei.com \
--cc=andy@infradead.org \
--cc=ard.biesheuvel@linaro.org \
--cc=bp@alien8.de \
--cc=catalin.marinas@arm.com \
--cc=dave.hansen@linux.intel.com \
--cc=dave.jiang@intel.com \
--cc=dvhart@infradead.org \
--cc=hpa@zytor.com \
--cc=kbusch@kernel.org \
--cc=lenb@kernel.org \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lkp@intel.com \
--cc=luto@kernel.org \
--cc=mingo@redhat.com \
--cc=peterz@infradead.org \
--cc=rafael.j.wysocki@intel.com \
--cc=rjw@rjwysocki.net \
--cc=tglx@linutronix.de \
--cc=vishal.l.verma@intel.com \
--cc=will@kernel.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).